A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Learning k for kNN Classification

S Zhang, X Li, M Zong, X Zhu, D Cheng - ACM Transactions on …, 2017 - dl.acm.org
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …

Energy-efficient resource allocation for secure OFDMA systems

DWK Ng, ES Lo, R Schober - IEEE Transactions on Vehicular …, 2012 - ieeexplore.ieee.org
In this paper, resource allocation for energy-efficient secure communication in an orthogonal
frequency-division multiple-access (OFDMA) downlink network is studied. The considered …

[Књига][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
This book presents state-of-the-art of research results related to the science, technology, and
engineering of cyber-physical systems (CPS), including system architecture, development …

Toward secure and lightweight data transmission for cloud–edge–terminal collaboration in artificial intelligence of things

W Fang, C Zhu, W Zhang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
As one of data sources in cloud–edge–terminal collaboration enabled artificial intelligence
of things (CETC-AIoT), the integrity and confidentiality of sensed information in the terminal …

Securing dynamic distributed storage systems against eavesdrop** and adversarial attacks

S Pawar, S El Rouayheb… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We address the problem of securing distributed storage systems against eavesdrop** and
adversarial attacks. An important aspect of these systems is node failures over time …

Reliable and secure multishot network coding using linearized Reed-Solomon codes

U Martínez-Peñas… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Multishot network coding is considered in a worst-case adversarial setting in which an
omniscient adversary with unbounded computational resources may inject erroneous …

Fundamentals of index coding

F Arbabjolfaei, YH Kim - Foundations and Trends® in …, 2018 - nowpublishers.com
Index coding is a canonical problem in network information theory that studies the
fundamental limit and optimal coding schemes for broadcasting multiple messages to …

Private coded caching

V Ravindrakumar, P Panda… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Recent work by Maddah-Ali and Niesen (2014) introduced coded caching which
demonstrated the benefits of joint design of storage and transmission policies in content …